Articles

Businesses join to create enterprise standard for blockchain networks

Enterprise Ethereum Alliance, a group made up of 500 businesses, has published its first standard for a business-centric distributed ledger that promises to speed up transactions while increasing privacy.

Google details how it will overturn encryption signals in Chrome

Google has fleshed out its plans to upend the way browsers warn users of insecure websites, spelling out gradual steps the company will take with Chrome.

Partner Content
Spotted unusual activity on network: Here's what to do next

Just like the physical world, prevention is better than cure and in the case of the cyber world, having the proper defence in place goes a long way in securing an enterprise network.

Partner Content
Here's the checklist of an efficient endpoint security solution

Most attacks on an organization can be traced back to devices connected to enterprise networks, which is basically an endpoint. And hence, that is why it is extremely important for an enterprise to ensure that their endpoints remain safe and secure.

Partner Content
Poor network visibility: Don't put your enterprise's security at risk

The number of devices that connect to enterprise networks is exponentially growing, leading to an inter-connected information highway. The size, complexity, and mobility of modern network environments are continuously increasing.

Partner Content
Key vulnerabilities in SMBs: Devices and people

On one hand, unlike the big business enterprises, SMBs may not always have the financial heft to really invest in cybersecurity solutions, which often leads to that taking a backseat.

Negligent Employee: A dangerous internal cyber threat

As organizations cope with the changing world of cybersecurity which continues to evolve at a frantic pace, they sometimes forget to neglect the danger that stares at them in their face.

Who wants to go threat hunting?

Rob Lee talks about how he became one of the first threat hunters and how you can become one. It will take skills in IR, forensics, and security analytics.

Online voting is impossible to secure. So why are some governments using it?

If you thought electronic voting machines were insecure, wait 'til you meet online voting.

Partner Content
More than 2.5 billion records stolen or compromised in 2017

Gemalto Breach Level Index highlights improperly secured databases in the cloud and internal threats were the fastest growing security risks for companies

5 signs you've been hit with an advanced persistent threat

Do you have valuable data on your network? Noticing odd network behavior? You could be the victim of an APT attack

New Georgia law criminalizes good-faith security research, permits vigilante action

Georgia cybersecurity folks are outraged about SB 315, and warn that it could cost the state jobs.